FEDORA-2018-a0914af224

security update in Fedora 28 for kernel, kernel-headers, & 1 more

Status: stable 17 hours ago

This stable update contains important fixes across the tree including an important fix for a bug that causes filesystem corruption in some cases.

Reboot Required

After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

Comments 13

This update has been submitted for testing by jcline.

4.19.x is over years the most shitty release i have seen an dthis build continues the tradiditon freezing my homesevrer every few hours without any reason given that raid-check while buling source cods in a VMware guest and running btrfs-scrub in another VMware guest over a 900 GB zstd comressed vdisk while update a win7/win10 VM should have been enough load to pretend the system is running stable

well, recently lying on the couch - WLAN on the smartphone gone, server freezed while doing nothing and given that Linux is too stupid to lay it's stacktraces on top of a running GUI zero informations what happend

with a sane graphics stack (https://bugzilla.redhat.com/show_bug.cgi?id=1544245) or never power off the screen 4.18.20-100.fc27.x86_64 would run on that host for months without crash

karma: -1

This update has been pushed to testing.

No apparent regression here. Thinkpad X250, docked with laptop panel and an external monitor over DisplayPort.

karma: +1 critpath: +1

Does not boot as xen domU : Booting `Fedora (4.19.7-200.fc28.x86_64) 28 (Twenty Eight)'

[ 6.350462] BUG: unable to handle kernel paging request at ffff88843c16a000] [ 6.350557] PGD 220c067 P4D 220c067 PUD 0 [ 6.350614] Oops: 0000 [#1] SMP NOPTI [ 6.350664] CPU: 2 PID: 1 Comm: swapper/0 Tainted: G W 4.19.7-200.fc28.x86_64 #1 [ 6.350763] RIP: e030:ptdump_walk_pgd_level_core+0x21a/0x4f0 [ 6.350832] Code: b8 00 00 00 00 00 40 00 00 49 83 c7 08 49 01 c5 4c 3b 7c 24 40 0f 84 c2 02 00 00 4c 89 e8 48 c1 f8 10 48 89 84 24 80 00 00 00 <49> 8b 3f 48 f7 c7 9f ff ff ff 0f 85 22 ff ff ff 41 b8 03 00 00 00 [ 6.351019] RSP: e02b:ffffc9000164fe68 EFLAGS: 00010286 [ 6.351083] RAX: ffff800000000000 RBX: ffffffff8191c146 RCX: 0000000000000000 [ 6.351162] RDX: 0000000000000101 RSI: ffffffff8220a000 RDI: 800000043c16a025 [ 6.351240] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [ 6.351327] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 6.351405] R13: 8000000000000000 R14: 0000000000000000 R15: ffff88843c16a000 [ 6.351505] FS: 0000000000000000(0000) GS:ffff8880b5d00000(0000) knlGS:0000000000000000 [ 6.351590] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6.351657] CR2: ffff88843c16a000 CR3: 000000000220a000 CR4: 0000000000002660 [ 6.351742] Call Trace: [ 6.351794] ? printk+0x58/0x6f [ 6.351844] ? rest_init+0xaa/0xaa [ 6.351893] kernel_init+0x31/0x10a [ 6.351943] ret_from_fork+0x35/0x40 [ 6.351993] Modules linked in: [ 6.352039] CR2: ffff88843c16a000 [ 6.352091] ---[ end trace 839b2bbe8ea714cf ]--- [ 6.352153] RIP: e030:ptdump_walk_pgd_level_core+0x21a/0x4f0 [ 6.352225] Code: b8 00 00 00 00 00 40 00 00 49 83 c7 08 49 01 c5 4c 3b 7c 24 40 0f 84 c2 02 00 00 4c 89 e8 48 c1 f8 10 48 89 84 24 80 00 00 00 <49> 8b 3f 48 f7 c7 9f ff ff ff 0f 85 22 ff ff ff 41 b8 03 00 00 00 [ 6.352417] RSP: e02b:ffffc9000164fe68 EFLAGS: 00010286 [ 6.352480] RAX: ffff800000000000 RBX: ffffffff8191c146 RCX: 0000000000000000 [ 6.352565] RDX: 0000000000000101 RSI: ffffffff8220a000 RDI: 800000043c16a025 [ 6.352643] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [ 6.352716] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 6.352787] R13: 8000000000000000 R14: 0000000000000000 R15: ffff88843c16a000 [ 6.352885] FS: 0000000000000000(0000) GS:ffff8880b5d00000(0000) knlGS:0000000000000000 [ 6.352972] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 6.355142] CR2: ffff88843c16a000 CR3: 000000000220a000 CR4: 0000000000002660 [ 6.357411] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000009 [ 6.357411] [ 6.361783] Kernel Offset: disabled

critpath: -1

Giving negative karma because Fn key does not work on my Thinkpad T440s. Kernel regression test failed.

karma: -1 #1645070: -1 kernel regression: -1

works for me

karma: +1

after restart the Fn key works again, so reverting negative karma.

karma: +1 #1645070: +1

Working fine here on a Dell Optiplex 7040.

karma: +1 critpath: +1 kernel regression: +1

This update has been submitted for batched by jcline.

This update has been submitted for stable by jcline.

This update has been pushed to stable.


Add Comment & Feedback
Toggle Preview

Comment fields support Fedora-Flavored Markdown. Comments are governed under this privacy policy.

-1 0 +1 Feedback Guidelines

Is the update generally functional? (karma)

You need to be logged in to add karma!

Does the system's basic functionality continue to work after this update?
#1554304 Sound really low volume on Thinkpad T570
#1645070 Keyboard « fn » shortcuts not mapped
#1652650 CVE-2018-19406 kernel: kvm: NULL pointer dereference in kvm_pv_send_ipi in arch/x86/kvm/lapic.c
#1653346 CVE-2018-19406 kernel: kvm: NULL pointer dereference in kvm_pv_send_ipi in arch/x86/kvm/lapic.c [fedora-all]
#1655816 CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()
#1655817 CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() [fedora-all]
Test Case kernel regression
Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
medium
Karma
+3
stable threshold: 3
unstable threshold: -3
Autopush
Disabled
Dates
submitted 5 days ago
in testing 4 days ago
in stable 17 hours ago

Related Bugs 6

00 #1554304 Sound really low volume on Thinkpad T570
0+1 #1645070 Keyboard « fn » shortcuts not mapped
00 #1652650 CVE-2018-19406 kernel: kvm: NULL pointer dereference in kvm_pv_send_ipi in arch/x86/kvm/lapic.c
00 #1653346 CVE-2018-19406 kernel: kvm: NULL pointer dereference in kvm_pv_send_ipi in arch/x86/kvm/lapic.c [fedora-all]
00 #1655816 CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()
00 #1655817 CVE-2018-19824 kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() [fedora-all]

Automated Test Results

Test Cases

0+1 Test Case kernel regression